Resources
Learn key tech terms with definitions and why it matters. Streamline AI's glossary is an essential resource for technology and SaaS lawyers and in-house counsel teams working with finance, marketing, sales, and other cross-functional business teams.
Please try different keywords.
API stands for application programming interface, which is a set of rules and protocols that allow different software applications to communicate with each other. APIs allow two applications to talk to each other — share data, and extra data with each other
a
Learn More →A contract governing the conditions under which a third party can use a company's API.
a
Learn More →The revenue that a company expects to earn annually from subscriptions.
a
Learn More →An Acceptable Use Policy (AUP) is a set of rules and guidelines that define how an organization's network, computer systems, and digital information can be used. It aims to ensure that users understand and adhere to proper conduct to maintain the integrity, confidentiality, and availability of the system.
a
Learn More →Agile development is a term primarily used in software development, referring to an iterative and flexible approach that emphasizes collaboration, customer feedback, and rapid response to changes.
a
Learn More →The process of removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous.
a
Learn More →The simulation of human intelligence processes by machines, especially computer systems.
a
Learn More →The process where a near-final product or service is evaluated by potential users in the real world.
b
Learn More →Extremely large data sets that may be analyzed computically to reveal patterns, trends, and associations.
b
Learn More →A system in which a record of transactions made in bitcoin or another cryptocurrency are maintained across several computers that are linked in a peer-to-peer network.
b
Learn More →A legal requirement in many jurisdictions to inform affected individuals and authorities when a data breach occurs.
b
Learn More →A flaw or error in a computer program or system that produces an incorrect or unexpected result.
b
Learn More →A deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
b
Learn More →The cost to acquire a new customer, including marketing and sales expenses. To calculate CAC, sum all the expenses associated with converting prospects into customers (such as marketing and sales personnel costs) and divide that sum by the total number of customers gained. For instance, if Streamline AI spends $100,000 on marketing and acquires 50 new clients in a year, the CAC is $2,000. A lower CAC is preferable for a business, as it indicates a reduced cost for each new customer added.
c
Learn More →The California Consumer Privacy Act (CCPA) is a state statute in California, United States, that went into effect on January 1, 2020. It aims to enhance privacy rights and consumer protection for residents of California. CCPA provides California residents with the right to know what personal data is being collected about them, whether their personal data is being sold or disclosed, and to whom. They also have the right to access, delete, or opt-out of the sale of their personal information.
c
Learn More →A cancellation policy is a set of terms and conditions that outline the process and requirements for terminating a subscription or service, including any potential penalties or refunds.
c
Learn More →Cash flow refers to the movement of money into and out of a business, representing the operating activities, investing activities, and financing activities during a specific period. Cash flow provides a clear picture of a company's ability to pay its short-term liabilities, such as bills, wages, and loans.
c
Learn More →Churn rate, also known as attrition rate, measures the percentage of customers a company loses within a specified time frame. At SaaS software companies, it signifies the number of subscribers who either cancel or opt not to renew their subscriptions. A higher churn rate means that more customers are ending their relationship with the company, whereas a lower churn rate indicates better customer retention.The churn rate is computed using the formula: (Lost Customers ÷ Total Customers at Start) x 100. For instance, if a business begins the quarter with 100 customers and loses 10 by the end, the churn rate would be calculated as (10 ÷ 100) x 100, resulting in a 10% quarterly churn rate.
c
Learn More →The delivery of computing services over the internet, including servers, storage, databases, networking, software, analytics, and intelligence.
c
Learn More →A service model in which data is maintained, managed, backed up remotely and made available to users over the internet, rather than on physical hard drives or local storage devices.
c
Learn More →An agreement that restricts both parties from sharing proprietary or confidential information.
c
Learn More →A declaration to your users on what cookies are active on your website, what user data they track, for what purpose, and where in the world this data is sent.
c
Learn More →The total revenue a company expects to earn from a customer throughout their entire relationship.
c
Learn More →Cyber insurance is a specialized insurance product designed to mitigate financial losses from cyber-related incidents such as data breaches, network damage, and business interruptions.
c
Learn More →A data backup is the process of creating copies of data or files to ensure that they can be recovered in case of a loss, corruption, hardware failure, or other unforeseen disasters.
d
Learn More →A data breach is an incident where unauthorized individuals access, steal, or disclose sensitive, protected, or confidential data. Such breaches can expose personal information like credit card numbers, social security details, or intellectual property, leading to identity theft or financial fraud.
d
Learn More →A data center is a facility that houses computer systems, such as servers, storage devices, and network equipment, used to store, process, and manage large amounts of data. They are essential for running various online services like websites, cloud computing, and data storage.
d
Learn More →A data controller is a person or organization that determines the purposes and means of processing personal data, making decisions about what data is collected and how it's used.
d
Learn More →Data mining is the process of discovering patterns, correlations, and insights within large datasets through the use of statistical methods and machine learning algorithms. It helps in making informed decisions by extracting valuable information and predictive insights from raw data.
d
Learn More →A contract between a data controller and a data processor that sets how data is to be handled, processed, and protected.
d
Learn More →A data processor is an entity that processes personal data on behalf of a data controller, following the controller's instructions. The data controller determines the purposes and means of processing personal data, while the data processor carries out the actual processing activities.
d
Learn More →A data retention policy is a set of guidelines that outlines how long an organization will retain certain types of data and when that data should be deleted or archived.
d
Learn More →The concept that data is subject to the laws of the country it is collected in.
d
Learn More →Deferred revenue refers to payments received by a company for goods or services that have not yet been delivered or performed.
d
Learn More →A United States copyright law enacted in 1998 that addresses the rights and obligations of copyright owners and internet service providers (ISPs) in the digital age.The DMCA criminalizes the production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works. One of the key aspects of the DMCA is its "safe harbor" provision for ISPs. It protects them from liability for copyright infringement by their users, provided they comply with specific requirements, such as promptly removing infringing content when notified by the copyright owner.
d
Learn More →A disaster recovery plan is a documented, structured approach that outlines the processes to follow when a technology-related disaster occurs, such as a cyberattack, hardware failure, or natural catastrophe. The plan includes details on restoring vital technology operations, data recovery, emergency response procedures, and communication channels.
d
Learn More →A measure of a company's operating performance. EBITDA focuses on the earnings derived solely from a company's core business operations, ignoring the effects of financing costs (interest), tax environment (taxes), and non-cash expenses (depreciation and amortization). This provides a clearer picture of a company's ability to generate cash from its operations.
e
Learn More →A distributed computing paradigm that brings computation and data storage closer to the location where it is needed.
e
Learn More →A contract between the licensor and purchaser, establishing the purchaser's right to use the software. It defines the terms and conditions under which the software can be used and outlines the rights and responsibilities of both parties.
e
Learn More →End-to-end encryption is a method of secure communication that encrypts data at the sending end and decrypts it at the receiving end, ensuring that only the intended recipient can read it. Even if the data is intercepted during transmission, it remains secure and unreadable without the corresponding decryption keys. A well-known example of end-to-end encryption is the messaging app WhatsApp, where messages are encrypted on the sender's device and only decrypted on the recipient's device. This ensures that even WhatsApp itself cannot read the messages exchanged between users.
e
Learn More →A contract provision that relieves the parties from performing their contractual obligations when certain circumstances beyond their control arise that make it prohibitive for a party to carry out their obligations.
f
Learn More →A pricing strategy where an entry level aspect of a product or service is provided free of charge, but a fee is charged for advanced (or full) features.
f
Learn More →A legal framework that sets guidelines for the collection and processing of personal data of citizens and residents within the EU, regardless of where the processing happens.
g
Learn More →The difference between revenue and the cost of goods sold, divided by revenue.
g
Learn More →A work or invention that is the result of creativity, such as a manuscript, software code, or a design, to which one has rights and for which one may apply for certain legal protections against unauthorized reproduction, such as patent, copyright, and trademark.
i
Learn More →A set of instructions to help IT staff detect, respond to, and recover from data security incidents.
i
Learn More →A contractual agreement in which one party agrees to compensate the other for any harm, liability, or loss.
i
Learn More →Software integrations refer to the process of linking different computing systems and software applications physically or functionally, to work together within a coordinated environment. They allow for seamless sharing and flow of data between various tools and platforms, enabling businesses to achieve greater efficiency and automation in their processes. By connecting disparate systems, software integrations help in creating a more unified and holistic view of business operations, fostering better decision-making and collaboration.
i
Learn More →Physical devices (i.e. home appliances, security systems) that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
i
Learn More →An old technology, system, or application that continues to be used, typically because it still functions for the users' needs.
l
Learn More →A contract clause that serves to limit the amount and types of compensation one party can recover from the other party in certain circumstances.
l
Learn More →A provision in a contract specifying a predetermined amount of money that must be paid as damages for breach of contract.
l
Learn More →A subset of artificial intelligence (AI) that uses data models and algorithms to imitate the way that humans learn, gradually improving its accuracy. Machine learning models use data to detect patterns and adjust their operations accordingly.
m
Learn More →A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
m
Learn More →A principle in software architecture where a single instance of the software runs on a server, serving multiple customers (each customer is called a tenant).
m
Learn More →A contract between an employee and an employer, where the employee agrees not to enter into competition with the employer during or after employment.
n
Learn More →A legal contract between at least two parties that describes confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict from being shared with outside parties without authorization.
n
Learn More →Software that is installed and runs on computers on the premises of the person or organization using the software, rather than at a remote facility.
o
Learn More →Software for which the original source code is made freely available and may be redistributed and modified according to the license terms.
o
Learn More →A type of cloud computing service providing a platform for customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure.
p
Learn More →Software patches are important because they fix bugs, vulnerabilities, and other issues within existing software applications.
p
Learn More →A method of trying to gather personal information using deceptive e-mails and websites.
p
Learn More →A statement or legal document that discloses some or all of the ways a company or entity gathers, uses, discloses, and manages an end-user's data, as well as specify ways in which the end user may contact the company to request details on the data that has been collected that identify them.
p
Learn More →Privacy by design is a concept that integrates privacy into the creation and operation of new devices, IT systems, networked infrastructure, and business processes.
p
Learn More →Pseudonymization is a data management and de-identification procedure by which personally identifiable information fields within a data record are replaced by one or more artificial identifiers
p
Learn More →A process through which additional or duplicate systems, equipment, etc., are installed to safeguard the functioning of the entire system or of data.
r
Learn More →An extrapolation of current revenue into the future, often calculated monthly or quarterly.
r
Learn More →A contract between a service provider and a user that specifies, usually in measurable terms, response and resolution times that the provider will furnish in the event of breakage or downtime.
s
Learn More →Software that is licensed on a subscription basis and is hosted by the provider.
s
Learn More →A testing environment that isolates untested code changes and experimentation from the production environment or repository.
s
Learn More →The ability of a system or company to handle a growing amount of work by having processes and systems in place to handle a larger workforce, more users, and more data.
s
Learn More →A small data file that digitally binds a cryptographic key to an organization's details.
s
Learn More →A centralized unit in an organization that deals with security issues. SOC analysts perform round-the-clock monitoring of an organization’s network and investigate any potential security incidents.
s
Learn More →Data about individuals that is protected by privacy laws, including health information, racial or ethnic origin, political opinions, and more.
s
Learn More →A computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
s
Learn More →An authentication process that allows a user to access multiple applications with one set of login credentials.
s
Learn More →A process of planning and managing software development. It typically involves dividing software development work into smaller, parallel, or sequential steps or sub-processes to improve design and/or product management.
s
Learn More →Legal instrument (typically via a contract) governing the use or redistribution of software.
s
Learn More →A type of patent (a type of intellectual property) that protects a new and innovative software idea or invention.
s
Learn More →Source code is the fundamental component of a computer program that is created by a programmer. Also known simply as code, it is any collection of text, with or without comments, written using a human-readable programming language, usually as plain text. Comparing a book to a software program, the source code would be the words in that book.
s
Learn More →A contract between a service provider and a subscriber that outlines the terms and conditions of the subscription.
s
Learn More →The legal agreements between a company providing a service and a person who uses that service.
t
Learn More →A person who will benefit from a contract, despite not being a party to the contract.
t
Learn More →A security process in which users provide two different authentication factors to verify themselves, such as login over the web and a code that's sent to a smartphone.
t
Learn More →A measure of system reliability, usually in the form of a percentage (like 99.9%).
u
Learn More →Information a company collects about its users, including personal information and usage statistics.
u
Learn More →A legal agreement that clearly states the provisions and conditions of the work to be performed by a contractor.
v
Learn More →The process of assigning unique version names or numbers to unique states of software or contracts.
v
Learn More →A technology that creates a safe and encrypted connection over a less secure network, such as the internet.
v
Learn More →A software security flaw that is known to the software vendor but doesn't have a patch in place to fix the flaw.
z
Learn More →Tools like Slack and Microsoft Teams for real-time messaging and collaboration among team members.
c
Learn More →Enables oversight of the entire contract life cycle, from inception to expiration or renewal.
c
Learn More →Tools like Google Docs and Microsoft Word that allow for document creation, editing, and collaboration.
d
Learn More →Provides a consolidated space for storing, accessing, and managing legal documents.
d
Learn More →Platforms aiding in identifying, collecting, and analyzing electronic information pertinent to lawsuits.
e
Learn More →Software that offers a consolidated view of all corporate entities.
e
Learn More →Tools such as Tableau that provide deep analytical insights, visual dashboards, and trend analyses.
i
Learn More →Platforms for creating, managing, and sharing in-house knowledge bases or wikis.
k
Learn More →All-in-one tool that consolidates legal intake and automatic triage, approval tracking, and basic project management.
l
Learn More →